Threat Landscape Briefing – February 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminals and hacktivists campaigns, data breaches, control strategies, and exposure...

Threat Landscape Briefing – March 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure...

Threat Landscape Briefing – April 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure...

Risk Management Case Study of a Small University

A small university in the American mid-west needed to introduce its IT stakeholders to key risk concepts as part of a new, broader IT governance mission. By gaining a...

Risk Management Case Study of a Regional Grocery Chain

A 20-person IT department in a mid-sized regional grocery retailer received a mandate from its Board of Directors to reapproach and increase its risk management...

Risk Management Case Study of a Global Chemical Manufacturing Firm

An Asian-headquartered chemical manufacturing organization with an 80-year history and facilities in over 20 countries wants to assess IT risks for its operations in the...

Avoid the Next Heartbleed

This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...

Data Audit Scorecard

The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...

Lenovo, Superfish, MITM attacks, and SSL Interception: the Bigger Picture

Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.

Develop and Implement a Security Incident Management Program – Phases 1-3

Organizations face an ever-evolving range of cyberthreats. It is crucial to have a security incident management program to detect, respond, and recover from security...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us